Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C
☆39Dec 7, 2019Updated 6 years ago
Alternatives and similar repositories for Malware-Devlopment
Users that are interested in Malware-Devlopment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Apr 3, 2024Updated last year
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- ☆16Oct 18, 2024Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- ☆20Jan 14, 2026Updated 2 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 4 months ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Mar 10, 2024Updated 2 years ago
- ☆21Mar 16, 2021Updated 5 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆23Mar 17, 2024Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- ☆119Jan 30, 2024Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆287Jan 21, 2024Updated 2 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 4 months ago
- ☆39May 31, 2024Updated last year
- Real-time detection and defense against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry…☆26Dec 8, 2025Updated 3 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆309Dec 9, 2023Updated 2 years ago
- Chrome extension tool for OSINT & Recon☆57Mar 12, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆84Aug 18, 2022Updated 3 years ago
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆46Nov 29, 2024Updated last year
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆288Aug 1, 2025Updated 7 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- ☆24Sep 13, 2022Updated 3 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago